Text Steganography Techniques: A Review

Abstract

The large-scale information interchange that occurs across computer networks in the modern day makes it imperative to protect that information and stop unauthorized individuals from accessing or altering it. Information hiding is one of the critical areas for maintaining information security, preventing unauthorized individuals from accessing and knowing its content. The steganography technique employs various types of media as covers for embedding secret messages. These media can be in the form of images, audio, video, text, and other forms of media. The process of embedding information within text presents several challenges, the most significant of which include the limited available space for concealment and the substantial impact of the hidden data on the text. This research includes a review of the most important techniques and studies used in text-based steganography, presenting their advantages and weaknesses.

Country : Iraq

1 Alaa Abdullah Idres2 Yaseen Hikmat Ismael

  1. Diploma Student, Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq
  2. Lecturer, Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq

IRJIET, Volume 7, Issue 11, November 2023 pp. 648-653

doi.org/10.47001/IRJIET/2023.711085

References

  1. Sun Bowen and et. al., 2023, “Topic Controlled Steganography via Graph-to-Text Generation”, DOI: 10.32604/cmes.2023.025082, pages No.:157-176.
  2. Akbar Chairil Fitra, 2020, “A Study of Text Steganography Methods”, pages No.: 369-372.
  3. Hamdan M. Abdullah and Hamarsheh Ala, 2017, “AH4S: an algorithm of text in text steganography using the structure of omega network”, DOI: 10.1002/sec.1752, pages No.: 6004-6016.
  4. Mandal Kumar Kumar and Singh Kumar Pradeep, 2019, “Information Hiding in Text Steganography: A Different Approach”, pages No.: 593-596.
  5. Khan Yahya and et. at., 2021, “Disbursal of Text Steganography in the Space of Double-Secure Algorithm”, https://doi.org/10.1155/2021/7336474, pages No.: 1-9.
  6. Agarwal Monika, 2013, “TEXT STEGANOGRAPHIC APPROACHES: A COMPARISON”, DOI: 10.5121/ijnsa.2013.5107, pages No: 91-106.
  7. Abdul Majeed Mohammed and et. al., 2021, “A Review on Text Steganography Techniques”, https:// doi.org/10.3390/math9212829, pages No: 1-28.
  8. Ahvanooey Taleby Milad and et. al., 2019, “Modern Text Hiding, Text Steganalysis, and Applications: A Comparative Analysis”, doi:10.3390/e21040355, pages No.: 1-29.
  9. Chaw Aye Aye, 2019, “Text steganography in Letter of Credit (LC) using synonym substitution-based algorithm”, International Journal of Advance Research and Development, Volume 4, Issue8, pages No.:59-63.
  10. Al-Nofaie Safia and et.al., 2019, “Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces”, Journal of King Saud University – Computer and Information Sciences, https://doi.org/10.1016/j. jksuci. 2019.06.010, pages No.:963-974.
  11. Alyousuf Ahmed Qasim Farah and Roshidi Din, 2020,” Analysis review on feature-based and word-rule based techniques in text steganography”, Bulletin of Electrical Engineering and Informatics, DOI: 10.11591/eei. v9i2.2069, pages No.: 764 – 700.
  12. Mustafa Abdul Aziz Nada,2020, “Text hiding in text using invisible character”, International Journal of Electrical and Computer Engineering (IJECE), DOI: 10.11591/ ijece. V10i4. Pp 3550-3557.
  13. Alanazi Norah and et. al., 2020,” Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses”, Journal of King Saud University – Computer and Information Sciences, https://doi.org/10.1016/j.jksuci.2020.04.011, pp. 1343–1356.
  14. Sadié K. Juvet and et. al., 2020,” Two high-capacity text steganography schemes based on color coding”.
  15. Khekan R. Ahlam and et. al., 2020, “New text steganography method using the Arabic letters dots”, Indonesian Journal of Electrical Engineering and Computer Science, DOI:10.11591/ijeecs. v21.i3. pp1784-1793, pp. 1784~1793.
  16. Akbar Chairil Fitra and et. al., 2020, “Steganography on Text using Word-Shift Coding and Centroid Methods”, Journal of Engineering and Applied Sciences, Page No.: 3095-3100.
  17. THABIT REEMA and et. al., 2022, “CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data”, Digital Object Identifier 10.1109/ACCESS.2022.3182712, pages No.: 65439 – 65458.
  18. Figueira Joao, 2022, “A Survey on Semantic Steganography Systems”, arXiv:2203.12425v1, pages No.:1 -7.
  19. ADEEB AHMED AHMED OMER and KABUDIAN JAHANSHA HSEYED, 2022, “Arabic Text Steganography Based on Deep Learning Methods”, Digital Object Identifier 10.1109/ACCESS.2022.3201019, pages No.: 94403 – 94416.
  20. Abdul Majeed Mohammed and et.al., 2022,” New Text Steganography Technique based on Multilayer Encoding with Format-Preserving Encryption and Huffman Coding”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 13, No. 12, pages No.:163 – 172.
  21. Osman Baharudin and et. al., 2023, “TEXT STEGANOGRAPHY USING THE SECOND QUOTIENT REMAINDER THEOREM AND DARK COLOUR SCHEMES”, Journal of Computational Innovation and Analytics, https://doi.org/10.32890/ jcia2023.2.1.2, pages 21- 40.
  22. Shakir Nooruldeen, 2023, “USING SPECIAL LETTERS AND DIACRITICS IN STEGANOGRAPHY IN HOLY QURAN”, Iraqi Journal for Computers and Informatics, Vol. 49, Issue 2, pages No.:1 – 8.
  23. Khosravi Baman, 2023, “Text steganography by changing the black color”, Doi: 10.22060/AJMC.2023.21801.1111.